
Lightning Network
The unsecure Lightning Network as BTC’s layer 2 scaling protocol
Bitcoin mining nodes operate using PoW and Bitcoin consensus, making it hard for major mining nodes to be anonymous, while...
More on L2 solutions
Layer 2 solutions are not useless in principle, and Rollups themselves can be useful, when used with a blockchain capable...
Lightning Network requiem
A paper by researchers at the University of Illinois revealed two major attack vulnerabilities in the Lightning Network system, which...
Hyperbitcoinization and Web 5.0: Joshua Henslee’s 2K subscribers special episode part 3
To celebrate his 2,000 subscribers on his YouTube channel, Joshua Henslee did a three-part "Ask Me Anything" episode where he...
Kurt Wuckert Jr. on Darntons podcast: The best tech always wins over time, and so will BSV
Kurt joined Darntons podcast to talk about Satoshi’s vision and how BSV has restored it, the fallacies of BTC and...
Taro and Taproot—just empty carbs
A recently published article by an anonymous author is seemingly aimed to promote the new "scaling solution" proposal on the...